The Curious Case of ShellExecute

Published: 04 November 2017
on channel: OALabs
4,660
118

Open Analysis Live! Why can't you hook and suspend processes created via ShellExecute? We take a look at the internals for ShellExecute and what happens when that API is used to create a new process.

-----
OALABS DISCORD
  / discord  

OALABS PATREON
  / oalabs  

OALABS TIP JAR
https://ko-fi.com/oalabs

OALABS GITHUB
https://github.com/OALabs

UNPACME - AUTOMATED MALWARE UNPACKING
https://www.unpac.me/#/

-----

Some background on the topics covered...

Link to the test script we used:
https://gist.github.com/herrcore/821a...

ShellExecute API documentation:
https://msdn.microsoft.com/en-us/libr...

Process creation flags documentation:
https://msdn.microsoft.com/en-us/libr...

CreateProcessInternalW API documentation:
http://a-twisted-world.blogspot.ca/20...


Also, a big shout out to Alex   / nullandnull   for discovering this quirk. We highly recommend all reverse engineers read his blog and check out his huge suite of awesome tools:

http://hooked-on-mnemonics.blogspot.com

https://bitbucket.org/Alexander_Hanel...

Feedback, questions, and suggestions are always welcome : )

Sergei   / herrcore  
Sean   / seanmw  

As always check out our tools, tutorials, and more content over at http://www.openanalysis.net


Watch video The Curious Case of ShellExecute online without registration, duration hours minute second in high quality. This video was added by user OALabs 04 November 2017, don't forget to share it with your friends and acquaintances, it has been viewed on our site 4,660 once and liked it 118 people.